Vulnerability identifier: #VU92058
Vulnerability risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-388
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the vfio_fsl_mc_set_irq_trigger() function in drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel:
External links
http://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417
http://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267
http://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d
http://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9
http://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012
http://git.kernel.org/stable/c/250219c6a556f8c69c5910fca05a59037e24147d
http://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.